What is the principle of adequate protection

Assignment Help Computer Network Security
Reference no: EM13328756

Short Answers. Please answer briefly and completely, and cite all sources of information.

1. What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?

2. What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.

3. Describe the fundamental principles in both the Bell-LaPadula and Biba security models. For each, explain what sort of security the model is intended to provide, the two key properties of the model, and then explain in your own words why each of the properties makes sense from a security standpoint.

4. Describe the similarities and differences between a virus, a Trojan horse, and a worm. Give examples of controls that could be implemented to mitigate the threat of each of these types of malicious code.

5. What is the difference between inference and aggregation? Give an example of each, and describe at least one way to mitigate each type of vulnerability.

6. Cite a risk in computing for which it is impossible or infeasible to develop a classical probability of occurrence. Why?

 

Reference no: EM13328756

Questions Cloud

Write the equations for the body in equilibrium : A rope that is tied between a motor and a crate can pull the crate up a hill of ice (assume no friction) at constant velocity. Write the equations for the body in equilibrium
Explain structure should become the c2-c3 bond : The C-C bond in this structure should become the C2-C3 bond in (2R,3S)-2-bromo-3-phenylpentane. Type the name of an atom or group to add to the structure, or press the atom's button. Click on an H atom to replace that H atom with the atom or group..
Calculate rate of return and standard deviation of escapist : Ina boom economy its rate of return is negative 28%, in a normal economy its rate of return is 8% and in a recession its rate of return is 48%. All three possible states of the economy are equally likely.
What is the speed of the automobile : Traveling at a speed of 15.2 m/s, the driver of an automobile suddenly locks the wheels by slamming on the brakes. What is the speed of the automobile after 1.15s have elapsed
What is the principle of adequate protection : What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.
Explain the possible alkenes formed in the dehyration : Give all of the possible alkenes formed in the dehyration of the following alcohols: a) 1-methylcyclohexanol b) 2-methylcyclohexanol c) 1-hydroxymethylcyclopentane d) 3,3-dimethyl-1-butanol
Do viruses infect hardware and executable files : Since physical security is often managed under separate responsibility from information security, risk analysis for information security does not need to address physical security.
What is the maximum amount that a firm should consider : What is the maximum amount that a firm should consider paying for a project that will return $12000 annually for 6 years if the opportunity cost is 12%
Calculate the new loan payments and then the present value : Casino.com Corporation is building a $25 million office building in Las Vegas and is financing the construction at an 80 % loan-to-value ratio, where the loan is in the amount of $20,000,000.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Create alternative message which has hash value

Generates the alternative message which has a hash value which collides with Bob's original hash value. Illustrate a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Write the symbolic logic for the 3des decryption

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd